GSP
Quick Navigator

Search Site

Unix VPS
A - Starter
B - Basic
C - Preferred
D - Commercial
MPS - Dedicated
Previous VPSs
* Sign Up! *

Support
Contact Us
Online Help
Handbooks
Domain Status
Man Pages

FAQ
Virtual Servers
Pricing
Billing
Technical

Network
Facilities
Connectivity
Topology Map

Miscellaneous
Server Agreement
Year 2038
Credits
 

USA Flag

 

 

Man Pages
DOAS.CONF(5) FreeBSD File Formats Manual DOAS.CONF(5)

doas.conf
doas configuration file

/usr/local/etc/doas.conf

The doas(1) utility executes commands as other users according to the rules in the doas.conf configuration file.

The rules have the following format:

permit|deny [options] identity [as target] [cmd command [args ...]]

Rules consist of the following parts:

|deny
The action to be taken if this rule matches.
options
Options are:
The user is not required to enter a password.
Do not log successful command execution to syslogd.
After the user successfully authenticates, do not ask for a password again for some time. Works on OpenBSD only, persist is not available on Linux or FreeBSD.
The user's environment is maintained. The default is to reset the environment, except for the variables DISPLAY and TERM.

Note: In order to be able to run most desktop (GUI) applications, the user needs to have the keepenv keyword specified. If keepenv is not specified then key elements, like the user's $HOME variable, will be reset and cause the GUI application to crash. Users who only need to run command line applications can usually get away without keepenv. When in doubt, try to avoid using keepenv as it is less secure to have environment variables passed to privileged users.

Note: The target user's PATH variable can be set at compile time by adjusting the GLOBAL_PATH variable in doas's Makefile. By default, the target user's path will be set to "/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:"

[variable ...] [variable=value ...] }
In addition to the variables mentioned above, keep the space-separated specified variables. Variables may also be removed with a leading ‘-’ or set using the latter syntax. If the first character of value is a ‘$’ then the value to be set is taken from the existing environment variable of the same name.
identity
The username to match. Groups may be specified by prepending a colon (‘:’). Numeric IDs are also accepted.
target
The target user the running user is allowed to run the command as. The default is all users.
command
The command the user is allowed or denied to run. The default is all commands. Be advised that it is best to specify absolute paths. If a relative path is specified, only a restricted PATH will be searched.
[argument ...]
Arguments to command. The command arguments provided by the user need to match those specified. The keyword args alone means that command must be run without any arguments.

The last matching rule determines the action taken. If no rule matches, the action is denied.

Comments can be put anywhere in the file using a hash mark (‘#’), and extend to the end of the current line.

The following quoting rules apply:

  • The text between a pair of double quotes (‘"’) is taken as is.
  • The backslash character (‘\’) escapes the next character, including new line characters, outside comments; as a result, comments may not be extended over multiple lines.
  • If quotes or backslashes are used in a word, it is not considered a keyword.

To make editing the doas.conf file safer, a convenience script called vidoas is included with the doas software. This script can be run as the root user (or via doas or sudo) and automatically checks the syntax of the doas.conf file before installing it on the system.

Please take note that it is a bad idea to assign permission to users implicitly, even if blocking/denying exceptions are made. For instance, try to avoid using rules like

permit susan as
deny susan as root

The above example uses two rules to permit Susan to switch to any user, except root. This is dangerous for two reasons. First, it means if new users, including ones with admin access, are added to the system later then Susan can use their accounts. It also means if the file is truncated or accessed while being updated the doas program may read the first rule before the second has been written, giving Susan access to everything, including the root account. The better approach to is explicity allow Susan to access only specific accounts she needs to use.

Entries in the doas.conf file must end with a newline character to indicate where a rule ends. Most text editors will add a newline or end of line character for you, however not all tools do. Please make sure each rule in your doas.conf file ends with a newline (Enter) character. Otherwise syntax checks will fail with an error "syntax error at line..."

The following example permits users in group wsrc to build ports; wheel to execute commands as any user while keeping the environment variables PS1 and SSH_AUTH_SOCK and unsetting ENV; permits tedu to run procmap as root without a password; and additionally permits root to run unrestricted commands as itself.
# Non-exhaustive list of variables needed to
# build release(8) and ports(7)
permit nopass setenv { \
        FTPMODE PKG_CACHE PKG_PATH SM_PATH SSH_AUTH_SOCK \
        DESTDIR DISTDIR FETCH_CMD FLAVOR GROUP MAKE MAKECONF \
        MULTI_PACKAGES NOMAN OKAY_FILES OWNER PKG_DBDIR \
        PKG_DESTDIR PKG_TMPDIR PORTSDIR RELEASEDIR SHARED_ONLY \
        SUBPACKAGE WRKOBJDIR SUDO_PORT_V1 } :wsrc
permit setenv { -ENV PS1=$DOAS_PS1 SSH_AUTH_SOCK } :wheel
permit nopass tedu as root cmd /usr/sbin/procmap
permit nopass keepenv root as root

doas(1)

The doas.conf configuration file first appeared in OpenBSD 5.8.

Ted Unangst <tedu@openbsd.org>
December 5, 2016 FreeBSD 13.1-RELEASE

Search for    or go to Top of page |  Section 5 |  Main Index

Powered by GSP Visit the GSP FreeBSD Man Page Interface.
Output converted with ManDoc.